Wednesday, November 01, 2017 11:08:06 AM
Your question? Quote:
Transmission of a one-time password (OTP) to a smartphone has traditionally been considered an effective out-of-band method. However, if the same phone is then used to submit the OTP— for example, via a web browser—the effectiveness of the OTP as a secondary factor is effectively nullified.
I think the answer is?
Once the user has been verified, the security computer establishes an “out- of-band” communication channel with the user via a different authentication channel (e.g., by calling the user’s mobile phone over a cellular network). Id. Using that second authentication channel, the user provides additional information that is used to authenticate the user for access."
In reality the problem in your assessment is that you are only looking at one source being used as a smart phone and not a computer! The concept being two different types of sources must be used and not one as you suggested being a phone only as you surmised !
I can't play in your Tech arena as you work for a software based company WBC, but it looks to me that the answer is nullified by the above.
But lets remember its a patent play!
Recent ZRFY News
- Partnership to Offer Enhanced Cybersecurity Solutions • AllPennyStocks.com • 05/22/2023 02:45:00 PM
NanoViricides Reports that the Phase I NV-387 Clinical Trial is Completed Successfully and Data Lock is Expected Soon • NNVC • May 2, 2024 10:07 AM
ILUS Files Form 10-K and Provides Shareholder Update • ILUS • May 2, 2024 8:52 AM
Avant Technologies Names New CEO Following Acquisition of Healthcare Technology and Data Integration Firm • AVAI • May 2, 2024 8:00 AM
Bantec Engaged in a Letter of Intent to Acquire a Small New Jersey Based Manufacturing Company • BANT • May 1, 2024 10:00 AM
Cannabix Technologies to Deliver Breath Logix Alcohol Screening Device to Australia • BLO • Apr 30, 2024 8:53 AM
Hydromer, Inc. Reports Preliminary Unaudited Financial Results for First Quarter 2024 • HYDI • Apr 29, 2024 9:10 AM